There is a critical security flaw in Mailman 2.1.5 which will allow
attackers to read arbitrary files.

---------------------------------------------------------------------
Fedora Update Notification
FEDORA-2005-132
2005-02-10
---------------------------------------------------------------------
Product : Fedora Core 3
Name : mailman
Version : 2.1.5
Release : 30.fc3
Summary : Mailing list manager with built in Web access.
Description :
Mailman is software to help manage email discussion lists, much like
Majordomo and Smartmail. Unlike most similar products, Mailman gives
each mailing list a webpage, and allows users to subscribe,
unsubscribe, etc. over the Web. Even the list manager can administer
his or her list entirely from the Web. Mailman also integrates most
things people want to do with mailing lists, including archiving, mail
news gateways, and so on.
Documentation can be found in: /usr/share/doc/mailman-2.1.5
---------------------------------------------------------------------
Update Information:
There is a critical security flaw in Mailman 2.1.5 which will allow
attackers to read arbitrary files.
The extent of the vulnerability depends on what version of Apache
(httpd) you are running, and (possibly) how you have configured your
web server. It is believed the vulnerability is not available when
Mailman is paired with a version of Apache >= 2.0, however earlier
versions of Apache, e.g. version 1.3, will allow the exploit when
executing a Mailman CGI script. All versions of Fedora have shipped
with the later 2.0 version of Apache and thus if you are running a
Fedora release you are not likely to be vulnerable to the exploit
unless you have explicitly downgraded the version of your web
server. However, installing this version of mailman with a security
patch represents a prudent safeguard.
This issue has been assigned CVE number CAN-2005-0202.
The bug report associated with this is:
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=147343
The errata associated with this for RHEL releases is:
http://rhn.redhat.com/errata/RHSA-2005-136.html
For additional piece of mind, it is recommended that you regenerate
your list member passwords. Instructions on how to do this, and more
information about this vulnerability are available here:
http://www.list.org/security.html
---------------------------------------------------------------------
* Tue Feb 08 2005 John Dennis - 3:2.1.5-30.fc3
- fix security vulnerability CAN-2005-0202, errata RHSA-2005:137, bug #147343
* Tue Nov 09 2004 John Dennis 3:2.1.5-29.fc3
- fix bug #137863, buildroot path in .pyc files
* Mon Nov 08 2004 John Dennis 3:2.1.5-27
- rebuild to fix bug #137863, python embeds build root in .pyc files
---------------------------------------------------------------------
This update can be downloaded from:
http://download.fedora.redhat.com/pub/fedora/linux/core/updates/3/
457b27f2f15c18b8de0e5fcff977d171 SRPMS/mailman-2.1.5-30.fc3.src.rpm
da424d3d5227650d843654acb22e23c3 x86_64/mailman-2.1.5-30.fc3.x86_64.rpm
e408bc622edf77f04680ead0cdae36cf x86_64/debug/mailman-debuginfo-2.1.5-30.fc3.x86_64.rpm
ec264fec376555f5af505f9b320020c6 i386/mailman-2.1.5-30.fc3.i386.rpm
fad64f3280cfdb4fcdd4520cf79a16b9 i386/debug/mailman-debuginfo-2.1.5-30.fc3.i386.rpm
This update can also be installed with the Update Agent; you can
launch the Update Agent with the 'up2date' command.
---------------------------------------------------------------------
--
John Dennis
--
fedora-announce-list mailing list
fedora-announce-list@redhat.com
http://www.redhat.com/mailman/listinfo/fedora-announce-list